Компьютерные сети
Компьютерная литература
  • формат pdf
  • размер 1.25 МБ
  • добавлен 13 февраля 2011 г.
Szigeti T. End-to-End QoS Network Design Quality of Service in LANs, WANs, and VPNs
Best-practice QoS designs for protecting voice, video, and critical data while mitigating network denial-of-service attacks
Understand the service-level requirements of voice, video, and data applications
Examine strategic QoS best practices, including Scavenger-class QoS tactics for DoS/worm mitigation
Lea about QoS tools and the various interdependencies and caveats of these tools that can impact design considerations
Lea how to protect voice, video, and data traffic using various QoS mechanisms
Evaluate design recommendations for protecting voice, video, and multiple classes of data while mitigating DoS/worm attacks for the following network infrastructure architectures: campus LAN, private WAN, MPLS VPN, and IPSec VPN
Quality of Service (QoS) has already proven itself as the enabling technology for the convergence of voice, video, and data networks. As business needs evolve, so do the demands for QoS. The need to protect critical applications via QoS mechanisms in business networks has escalated over the past few years, primarily due to the increased frequency and sophistication of denial-of-service (DoS) and worm attacks.
End-to-End QoS Network Design is a detailed handbook for planning and deploying QoS solutions to address current business needs. This book goes beyond discussing available QoS technologies and considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN.
The book starts with a brief background of network infrastructure evolution and the subsequent need for QoS. It then goes on to cover the various QoS features and tools currently available and comments on their evolution and direction. The QoS requirements of voice, interactive and streaming video, and multiple classes of data applications are presented, along with an overview of the nature and effects of various types of DoS and worm attacks. QoS best-practice design principles are introduced to show how QoS mechanisms can be strategically deployed end-to-end to address application requirements while mitigating network attacks. The next section focuses on how these strategic design principles are applied to campus LAN QoS design. Considerations and detailed design recommendations specific to the access, distribution, and core layers of an enterprise campus network are presented. Private WAN QoS design is discussed in the following section, where WAN-specific considerations and detailed QoS designs are presented for leased-lines, Frame Relay, ATM, ATM-to-FR Service Interworking, and ISDN networks. Branch-specific designs include Cisco® SAFE recommendations for using Network-Based Application Recognition (NBAR) for known-worm identification and policing. The final section covers Layer 3 VPN QoS design-for both MPLS and IPSec VPNs. As businesses are migrating to VPNs to meet their wide-area networking needs at lower costs, considerations specific to these topologies are required to be reflected in their customer-edge QoS designs. MPLS VPN QoS design is examined from both the enterprise and service provider's perspectives. Additionally, IPSec VPN QoS designs cover site-to-site and teleworker contexts.
Whether you are looking for an introduction to QoS principles and practices or a QoS planning and deployment guide, this book provides you with the expert advice you need to design and implement comprehensive QoS solutions.
Hardcover: 768 pages.
Publisher: Cisco Press; illustrated edition edition (November 19, 2004).
Language: English.
ISBN-10: 1587051761.
ISBN-13: 978-1587051760.
Похожие разделы
Смотрите также

Boukerche A. (editor). Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks

  • формат pdf
  • размер 6.73 МБ
  • добавлен 06 декабря 2011 г.
John Wiley & Sons, Inc., 2009, - 518 pages. Ad hoc is a Latin expression that means ''for the particular end or case at hand without consideration of wider application''. An ad hoc network means that the network is established for a particular, often extemporaneous service customized to applications for a limited period of time. Ad hoc networks (Computer networks). Wireless LANs. Mobile computing. Computer algorithms.

Held G. Network Design Principles and Applications

  • формат pdf
  • размер 23 МБ
  • добавлен 13 февраля 2011 г.
Never has the need for reliable internetworking been greater, yet with networks now comprising differing operating systems, hardware, and software, achieving a reliable network has never been more complex. Network planners and managers face a multitude of difficult decisions-decisions made even more difficult by the need for knowledge from a variety of disciplines. To meet that need, renowned author Gilbert Held assembled a panel of expert practi...

Held G. Practical Network Design Techniques: A Complete Guide For WANs and LANs

  • формат pdf
  • размер 3.28 МБ
  • добавлен 13 февраля 2011 г.
This is a practical guide to techniques of network design in data communications. It is intended to help a broad spectrum of people working in the field by covering such key problems as where to locate multiplexers, how many ports should multiplexers and concentrators have to service given terminal population, how to route a multidrop line to optimize its cost, what type of line facilities should be used under different networking conditions. Foc...

Holt A., Huang Chi-Yu. 802.11 Wireless Networks: Security and Analysis

  • формат pdf
  • размер 5.34 МБ
  • добавлен 02 сентября 2011 г.
Sрringer, 2010. - 212 p. This book shows how to build and analyse wireless networks, exploring how an enterprise wireless network with the highest levels of security can be built. The book also explains how to configure wireless network equipment in order implement various network architectures and levels of security. The contents describe how to set up every component of the network, from the client supplicant and the access-points, through to...

Kaveh Pahlavan, Prashant Krishnamurthy. Networking Fundamentals: Wide, Local and Personal Area Communications

  • формат pdf
  • размер 12.37 МБ
  • добавлен 03 апреля 2010 г.
Wiley, 2009, 641 p. Focusing on the physical layer, Networking Fundamentals provides essential information on networking technologies that are used in both wired and wireless networks designed for local area networks (LANs) and wide-area networks (WANs). The book starts with an overview of telecommunications followed by four parts, each including several chapters. Part I explains the principles of design and analysis of information networks at th...

Oppenheimer P. Top-Down Network Design (3rd edition)

  • формат pdf
  • размер 3.87 МБ
  • добавлен 13 февраля 2011 г.
Hardcover: 600 pages. Publisher: Cisco Press; 3 edition (September 3, 2010). Language: English. ISBN-10: 1587202832. ISBN-13: 978-1587202834. Objectives. The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer’s business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you...

Pitsillides A., Ioannou P., Lestas M., Rossides L. Adaptive Nonlinear Congestion Controller for a Differentiated-Services Framework

  • формат pdf
  • размер 733.84 КБ
  • добавлен 15 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. The growing demand of computer usage requires efficient ways of managing network traffic in order to avoid or at least limit the level of congestion in cases where increases in bandwidth are not desirable or possible. In this paper we developed and analyzed a generic Integrated Dynamic Congestion Control (IDCC) scheme for controlling traffic using information on the status of eac...

Retana A. Advanced IP Network Design (CCIE Professional Development)

  • формат pdf
  • размер 4.32 МБ
  • добавлен 13 февраля 2011 г.
A core textbook for CCIE preparation Learn how to apply effective hierarchical design principles to build stable, large-scale networksExamine broken networks and discover the best methods for fixing themUnderstand how the right topology enhances network performanceConstruct the most efficient addressing and summarization scheme for your networkPrevent network failure by applying the most appropriate redundancy at the network core, distribution la...

Xu J., Lipton R. On Fundamental Tradeoffs Between Delay Bounds and Computational Complexity in Packet Scheduling Algorithms

  • формат pdf
  • размер 579.97 КБ
  • добавлен 14 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. Computational complexity, decision tree, delay bound, packet scheduling, quality of service.

Yau D., Lui J., Liang F., Yam Y. Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles

  • формат pdf
  • размер 782.2 КБ
  • добавлен 14 апреля 2011 г.
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005. Congestion control, distributed denial of service, network security, router throttling.